Book Image

MLOps with Red Hat OpenShift

By : Ross Brigoli, Faisal Masood
Book Image

MLOps with Red Hat OpenShift

By: Ross Brigoli, Faisal Masood

Overview of this book

MLOps with OpenShift offers practical insights for implementing MLOps workflows on the dynamic OpenShift platform. As organizations worldwide seek to harness the power of machine learning operations, this book lays the foundation for your MLOps success. Starting with an exploration of key MLOps concepts, including data preparation, model training, and deployment, you’ll prepare to unleash OpenShift capabilities, kicking off with a primer on containers, pods, operators, and more. With the groundwork in place, you’ll be guided to MLOps workflows, uncovering the applications of popular machine learning frameworks for training and testing models on the platform. As you advance through the chapters, you’ll focus on the open-source data science and machine learning platform, Red Hat OpenShift Data Science, and its partner components, such as Pachyderm and Intel OpenVino, to understand their role in building and managing data pipelines, as well as deploying and monitoring machine learning models. Armed with this comprehensive knowledge, you’ll be able to implement MLOps workflows on the OpenShift platform proficiently.
Table of Contents (13 chapters)
Free Chapter
1
Part 1: Introduction
3
Part 2: Provisioning and Configuration
6
Part 3: Operating ML Workloads

Securing model endpoints

When exposing models as APIs, you will want to limit the access to your APIs to certain clients. You will also want to ensure that the APIs are not vulnerable to known Common Vulnerabilities and Exposures (CVE). When you store your model containers in Red Hat Quay, it will scan the containers to find out any CVE in the libraries and the runtime of your code. Quay is outside the scope of this book but there is plenty of information available on Quay. Packt’s OpenShift Multi-Cluster Management Handbook contains details about Quay, if you want to know more about it.

The API you deployed earlier in this chapter can be accessed via the HTTPS protocol. This means that OpenShift is already encrypting the traffic using the certificates that have been configured to expose the applications. The configuration of these certificates is outside the scope of this book.

The first step is to restrict access to the API through an authentication mechanism. RHODS...